• Electromagnetic Analysis Perturbation using Chaos Generator 

    Sarno, Thomas; Wacquez, Romain; Kussener, Edith; Maurine, Philippe; Jradi, Khalil; Portal, Jean-Michel; Aboulkassimi, Driss; Souiki-Figuigui, Sarra; Postel-Pellerin, Jeremy; Canet, Pierre; Chambonnea, Maxime; Grojo, David (2016-11-14)
    Text en actes de congrés
    Accés obert
    Cryptographic algorithms albeit mathematically sure may have security breaches when implemented on hardware chips. There are several ways to compromise their security, one method is to analyze their electromagnetic (EM) ...